Author of the publication

A Security Framework for Distributed Ledgers

, , , , , and . CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, page 3611-3618. New York, Association for Computing Machinery, (2021)
DOI: 10.1145/3460120.3485362

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collapse Detection and Avoidance for SIP Architectures., , , and . Praxis der Informationsverarbeitung und Kommunikation, 35 (2): 91-99 (2012)A Security Framework for Distributed Ledgers, , , , , and . CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, page 3611-3618. New York, Association for Computing Machinery, (2021)An Architectural and Evaluative Review of Implicit and Explicit SIP Overload Handling., , , and . IJMTIE, 1 (4): 12-27 (2011)Using E-Mail SPAM DNS Blacklists for Qualifying the SPAM-over-Internet-Telephony Probability of a SIP Call., , , and . ICDS, page 254-259. IEEE Computer Society, (2009)Practical Attacks against the I2P Network., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 432-451. Springer, (2013)Stop the Flood - Perimeter Security- and Overload- Pre-evaluation in Carrier Grade VoIP Infrastructures., , , and . NEW2AN, volume 7469 of Lecture Notes in Computer Science, page 359-370. Springer, (2012)BIQINI - A Flow-Based QoS Enforcement Architecture for NGN Services., , , and . TRIDENTCOM, volume 46 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 653-667. Springer, (2010)Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks., , and . CCS, page 801-815. ACM, (2019)My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data., , , , , , , and . PoPETs, 2019 (1): 108-132 (2019)Configuration coverage in the analysis of large-scale system software., , , , and . PLOS@SOSP, page 2:1-2:5. ACM, (2011)